Symantec Clientless VPN Gateway 4460
October 06, 2004
$10,245; $17,990 inc. 50 licenses
- Ease of Use:
- Value for Money:
- Overall Rating:
It is possible to produce highly flexible and complex security rules to match most requirements.
Some features can only be used from the command line interface.
A flexible system that addresses the business need for secure remote access from a mix of clients.
The Symantec 4460 device provides two 10/100/1000 copper network interfaces in a 2U height rack mountable chassis. The front panel contains an LCD screen and a four-button control group is used for the initial IP set-up, so there is no fiddling about with serial cables.
The unit does have a serial port for those who want to use unencrypted access.
After configuring the interface, the system generates and displays the password to be used to access the unit's administration functions afterwards. This password changes whenever changes are made from the front panel.
The device would normally be administered either by using a web browser over an SSL-encrypted connection or by using a Secure Shell (SSH) client.
Although the graphical interface gives control over the more commonly used functions, the only way to get access to all aspects of the system is through the command line interface, and the documentation reflects this. Setting up security parameters and users is fairly simple, and it is possible to test and validate security settings while setting them up, which saves time and effort later on by helping to eliminate potential problems early on in the process.
Security structures with users, groups and roles can produce complex relationships, and the system provides a tree diagram of these as they are configured, which helps to clarify things. The system's on-line help is page-related rather than context-sensitive but still manages to display relevant and useful information. The system uses combinations of simple and advanced rules to control access to resources. Simple rules can handle most requirements, while advanced rules use regular expressions to provide more detailed and complex control.
The system provides access to resources through a combination of portal web pages and Java applets running in the client browser.
There are statistics enough to gratify anyone, with dynamically updated performance graphs and log analysis features for all aspects of the system's operation, with support for an external syslog server.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Technical Information Security Consultant
Adeptis - Kent
Senior Security Analyst
Adeptis - Kent
Business Development Manager (IT Security Services)
Adeptis - Reading, Berkshire
Senior Network Security Engineer, London, £68-85k + package
Infosec People - England, London
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Report: Mirai 'is just the tip of the iceberg'
- Data centres are on the move - where will they end up?
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- 400% increase in POS malware variants across US Thanksgiving weekend
- Only 25% of businesses can effectively detect and respond to data breaches
- Is BYOD your company's norm? Beware the ghosts of data past this Christmas
- Over 400,000 phishing sites have been detected each month in 2016
- TalkTalk customers urged to get routers swapped over hacker fears